slackbuilds/network/reaver
Dave Woodfall 7f6c222009
network/reaver: Add -fcommon to CFLAGS.
Signed-off-by: Dave Woodfall <dave@slackbuilds.org>

Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
2022-02-27 01:09:54 +07:00
..
README
reaver.SlackBuild network/reaver: Add -fcommon to CFLAGS. 2022-02-27 01:09:54 +07:00
reaver.info
slack-desc

README

Reaver implements a brute force attack against Wifi Protected Setup (WPS)
registrar PINs in order to recover WPA/WPA2 passphrases, as described in
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and
has been tested against a wide variety of access points and WPS
implementations.

On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase
in 4-10 hours, depending on the AP. In practice, it will generally take half
this time to guess the correct WPS pin and recover the passphrase.